Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/1/2016
03:35 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Ransomware Authors Break New Ground With Petya

Instead of encrypting files on disk, Petya goes for the jugular by encrypting the entire disk instead, says F-Secure.

Ransomware developers appear to have come up with a new way of making life miserable for victims of their extortion campaigns, even as federal officials in the US and Canada Thursday issued an alert on the scourge.

Security vendor F-Secure on Friday issued an alert on Petya, a new ransomware sample that locks the entire hard disk of a computer instead of simply encrypting files on disk like other ransomware tools.

According to F-Secure, Petya encrypts the filesystem’s master file table (MFT) ensuring that the operating system is unable to locate needed files, thereby rendering the computer completely unusable.

“It installs itself to the disk’s master boot record (MBR) like a bootkit. But instead of covert actions, it displays a red screen with instructions on how to restore the system,” F-Secure senior security researcher Jarkko Turkulainen wrote.

Attacking the MFT takes less time than encrypting files on disk while yielding the same results, F-Secure security advisor Sean Sullivan added in comments to Dark Reading.

“Many of the other crypto-ransomware families require time and CPU,” Sullivan says. Victims of ransomware attacks, in fact, often report their computers slowing down significantly during an attack. While home users may not know quite what to make of the slowdown, employees at enterprises sometime have time to get help in preventing a full compromise, Sullivan says.

With Petya that is not an option. “Petya is able to hit the MFT in seconds before crashing the system and forcing a restart. In an enterprise environment, there would be no time to call for help.”

For victims, Petya introduces problems that other ransomware tools typically do not. Because Petya infects the master boot record, it disables the entire system. So the victim would need to find another computer with Internet access in order to pay off the ransom and regain access to their compromised system. While this may not, by itself, present a problem for business users, home users could find it challenging, Sullivan said.

Petya also leaves it pretty much up to the user to download the Tor browser to access the hidden service URL for paying the ransom.  “Petya doesn’t attempt to provide proxy links to the Tor hidden service,” suggesting that the malware authors either, do not care about the difficulties of installing the Tor browser, or they haven’t incorporated that feature yet, he said.

Somewhat ironically, in making it harder for victims to pay a ransom, Petya’s authors may have also lowered their own chances of profiting from it, says Sullivan. As a result, the likelihood of the same technique being used more widely will depend on the success malware authors have in monetizing Petya.

“That will depend on whether or not people figure out how to pay,” Sullivan says. “It does definitely have some advantages in how it hits its victims. So, we’ll likely see more, but it is too soon to say if it will become common.”

News of Petya comes amid heightening concerns about a major increase in ransomware samples and in ransomware attacks in recent months. Many believe that the success that malware authors have had in extorting money from victims is attracting more criminals, including organized cybercrime groups into the ransomware space. In recent months, ransomware samples like Locky, TeslaCrypt and Samas, have victimized numerous individuals and organizations, including several major hospitals.

The surge in attacks prompted the U.S Department of Homeland Security to issue an alert in conjunction with the Canadian Cyber Incident Response Centre, warning consumers and businesses of the seriousness of the threat. The alert, issued late Thursday, warned consumers and businesses about the “devastating” consequences of a ransomware attack. “Recovery can be a difficult process that may require the services of a reputable data recovery specialist,” the alert noted in offering some precautions.

The recommendations include the need for individuals and organizations to employ a data backup and recovery plan for crucial information and the use of whitelisting to ensure that only approved applications are allowed to run on a system. Other advice included the need for people to jeep their software properly updated and patched and to limit the ability for users to install and run applications on their systems

Related stories:

 

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Click here for pricing information and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
theb0x
50%
50%
theb0x,
User Rank: Ninja
4/6/2016 | 12:09:23 PM
Re: proofreader required?
My Jeep is still unpatched running an irc daemon on port 6667.
iani540
50%
50%
iani540,
User Rank: Apprentice
4/5/2016 | 8:55:42 PM
proofreader required?
"the need for people to jeep their software properly updated"


I think you need a proof reader
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
4/4/2016 | 7:44:04 AM
Anti-encryption argument?
As much as Ransomware worries me, I'm more concerned that politicians will get the wrong end of the stick (either deliberately or not) and use ransomware as an example of why they want to break encryption and weaken security. 

Do you think they might take that tack?
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25660
PUBLISHED: 2020-11-23
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph...
CVE-2020-25688
PUBLISHED: 2020-11-23
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a...
CVE-2020-25696
PUBLISHED: 2020-11-23
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating sy...
CVE-2020-26229
PUBLISHED: 2020-11-23
TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability...
CVE-2020-28984
PUBLISHED: 2020-11-23
prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.